A) Viruses B) Malware C) Spyware D) Spam
A) The current era characterized by the use of digital technologies B) All of the above C) A phase in the Middle Ages D) A term reffering to the Stone Age
A) Massive datasets that require advanced analytics B) Larged-sized computer hardware C) Extremely large physical documents D) Extremely large physical documents
A) 2005 B) 2001 C) 2000 D) 2003
A) Social Networking B) Video Sharing Sites C) Blogs D) Wikis
A) Charles Babbage B) John von Neumann C) Grace Hopper D) Ada Lovelace
A) Edison B) Mauchly C) Byron D) Babbage
A) Telephone B) Computer C) Calculator D) Analytical Engine
A) A type of computer programming language B) A network of interconnected smart devices that communicate and share data C) The internet used exclusively for gaming D) The latest version of internet browsers
A) Clicking B) Phishing C) Hacking D) Fishing
A) Improved user control over device functionalities B) Unauthorized access to personal data C) Excessive device durability D) Limited data storage capabilities
A) 5G B) Augmented Reality C) Internet of Things D) Blockchain Data
A) Limited access to medical information B) Increased paperwork and administrative tasks C) Slower response time in emergencies D) Improved patient care and treatment options
A) Limited access to movies and music B) Enabled on-demand and personalized entertainment choices C) Decreased options for entertainment D) Increased cost of entertainment
A) Twitter B) Tiktok C) Facebook D) Instagram
A) Technological Determinism B) None of the above C) Technological Change D) Social Constructivism
A) Led to economic recession B) Slowed down economic growth C) Enhanced productivity and efficiency D) Increased unemployment rates
A) Prison mayor B) Prison major C) Reclusion temporal D) Reclusion temporary
A) Virtual Reality B) Wi-Fi Eavesdropping C) Automation D) Cloud Computing
A) Wirelessly through the internet B) Through postal mail C) Through wired telephone lines D) All of these
A) Stealing someone's personal information to impersonate them for fraudulent purposes B) Pretending to be someone else in online forums C) A harmless online park D) Creating fake social media profiles
A) Spyware B) Virus C) Worms D) Malware
A) Regularly changing passwords every few years B) Using the same password across multiple accounts C) Using the same password across multiple accounts D) Using a combination of uppercase, lowercase, numbers, and symbols
A) Vulnerabilities in IoT device security B) Lack of device connectivity C) Incompatibility with modern networks D) Excessive power consumption
A) To confuse the recipient B) To show off one's technical skills C) To convey emotion or tone in text-based conversation D) To make the message longer
A) Artificial Intelligence B) Internet of Things C) Virtual Reality D) Augmented Reality
A) Increase in access to information and services that has accompanied the growth of the internet B) Students can access teaching materials from all over the world C) Can help people to communicate trough online games D) Reduced personal interaction
A) 2020 B) 2023 C) 2008 D) 2014
A) Through wired telephone lines B) Through postal mail C) Wirelessly through the internet D) Wirelessly through the internet
A) Social Constructivism B) Technological Determinism C) None of the above D) Technological Change
A) Ransomware B) Trojan Horses C) Spam D) Spyware
A) Charles Babbage B) Blaise Pascal C) Grace Hopper D) John Mauchly
A) Wi-Fi Eavesdropping B) Viruses C) Worms D) Trojan Horses
A) Internet of Things B) Internet devices C) Communication of things D) Communication devices
A) AI B) Z1 C) 5G D) ED1
A) Malware B) Spamming C) Phishing D) Pharming
A) Teleworking (Work from Home) B) All of the above C) Work inside the Company D) Work from outside of the Country
A) They involve physical break-ins B) They are always detected and prevented by antivirus software C) They are always detected and prevented by antivirus software D) They attempt to trick individuals into revealing sensitive information
A) Republic Act No. 10173 Data Privacy Act of 2013 B) Republic Act No. 10175 Cybercrime Prevention Act of 2013 C) Republic Act No. 10173 Data Privacy Act of 2012 D) Republic Act No. 10175 Cybercrime Prevention Act of 2012
A) Jack Dorsey B) Timothy John Berners-Lee C) Mark Zuckerberg D) Vinton Gray
A) Adware B) Spyware C) Trojan Horse D) Ransomware
A) Web 1.0 B) Web 1.1 C) Web 2.0 D) Web 3.0
A) Papyrus Plant B) Phoenician Alphabet C) Abacus D) Petroglyphs
A) Data Communication B) Data transmission C) Dataset D) Database
A) Unauthorized access to personal data B) Improved user control over device functionalities C) Excessive device durability D) Limited data storage capabilities
A) Basic mobile phone B) Standard printer C) Traditional desktop computer D) Smart thermostat
A) No impact on the environment B) Positive contribution to environmental conservation C) Increased pollution and waste D) Decreased use of natural resources
A) Fast downloading of files B) Conducting online surveys C) Securing online transactions D) Real-time data transmission of audio or video content
A) Blockchain Data B) Augmented Reality C) Augmented Virtual D) Virtual Reality
A) Blockchain Data B) Blockchain Communication C) Blockchain Reality D) Blockchain Message
A) 2014 B) 2020 C) 2023 D) 2008
A) Decreased access to educational resources B) Limited interaction with teachers C) Increased travel time to physical classrooms D) Improved access to a variety of learning materials
A) Automation B) Virtual Reality C) Wi-Fi Eavesdropping D) Cloud computing
A) One of the most important technologies of everyday life, and it will continue to pick up steam as more businesses realize the potential of connected devices to keep them competitive B) All of the above C) Helps people live and work smarter, as well as gain complete control over their lives D) Enables companies to automate processes and reduce labor costs. It also cuts down on waste and improves service delivery, making it less expensive to manufacture and deliver goods
A) Because of the COVID-19 pandemic many business faced significant challenges and turned into online businesses B) Because of the new gadget that will be released C) Because of many modern technologies D) All of the above
A) Malware B) Identity theft C) Hacking D) Viruses
A) Increased reliance on intuition B) Improved data-driven decision-making through analytics C) Decreased need for strategic planning D) All of the above
A) Cloud computing B) Analog computing C) Mainframe computing D) Blockchain
A) To promote ethical hacking practices B) To teach hacking techniques C) To increase vulnerability to cyber attacks D) To raise awareness about potential internet threats and safe online practices
A) Application server B) Policy server C) Mailserver D) File server
A) Never, because it's not important in the Digital world B) Only when writing formal emails C) Always, to ensure clarity and professionalism D) Only when communicating with close friends
A) Cybersex B) Cyberbullying C) Cyber Defamation D) Child Pornography
A) IPsec B) HTTPS C) FTP D) SSH
A) Penalty atleast Php 5,000 B) Penalty atleast Php 500,000 and or prison mayor C) Prison mayor only D) Penalty atleast Php 200,000 and or prison mayor
A) Internet Service Provider B) Internet Security Protocol C) Internet Search Provider D) Internet Support Program
A) Networking and Technology B) None of the above C) Internet and Etiquette D) Network and Etiquette
A) Penalty of 6-12 years of imprisonment or prison mayor B) Penalty at least Php 500, 000 and or prison mayor C) Penalty of 20,000 D) Penalty of 1 year of imprisonment or prison mayor
A) Computer Addiction B) Piracy C) Copyright infringement D) Plagiarism
A) A type of computer virus B) A set of rules for polite and respectful behavior on the Internet C) A social media platform D) A social media platform
A) Prison major B) Prison mayor C) Reclusion temporary D) Reclusion temporal
A) The sender is shouting or being rude B) The email is spam and should be deleted C) The sender is emphasizing the importance of the email D) The email contains confidential information
A) A software that provides free services B) Malicious software that encrypts a victims data and demands a ransom for its release C) A legitimate form of remote work D) A software that provides free services
A) Amazon B) Facebook C) YouTube D) eBay
A) Byte B) Bait C) Bit D) Byt
A) Educational Website B) Media Website C) Personal Website D) Nonprofit Website
A) IP address B) Browser C) DNS D) Server
A) The science of artificial intelligence B) A type of computer game C) The practice of securing computer systems and networks from cyber threats D) The study of the stock market
A) Thou shall respect personal space B) Thou shall be prompt C) Thou shall be prompt D) Thou shall avoid eye contact
A) Tumbler B) Wordpress C) Blogger D) Pinterest |